• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

图形相似性的安全判断及其在对抗恶意对手方面的应用。

The secure judgment of graphic similarity against malicious adversaries and its applications.

机构信息

Computer Department, Tianjin Ren'ai College, Tianjin, 301636, China.

School of Information Engineering, Inner Mongolia university of science and technology, Baotou, 014010, China.

出版信息

Sci Rep. 2023 Mar 21;13(1):4617. doi: 10.1038/s41598-023-30741-6.

DOI:10.1038/s41598-023-30741-6
PMID:36944671
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10030665/
Abstract

With the advent of the era of big data, privacy computing analyzes and calculates data on the premise of protecting data privacy, to achieve data 'available and invisible'. As an important branch of secure multi-party computation, the geometric problem can solve practical problems in the military, national defense, finance, life, and other fields, and has important research significance. In this paper, we study the similarity problem of geometric graphics. First, this paper proposes the adjacency matrix vector coding method of isomorphic graphics, and use the Paillier variant encryption cryptography to solve the problem of isomorphic graphics confidentiality under the semi-honest model. Using cryptography tools such as elliptic curve cryptosystem, zero-knowledge proof, and cut-choose method, this paper designs a graphic similarity security decision protocol that can resist malicious adversary attacks. The analysis shows that the protocol has high computational efficiency and has wide application value in terrain matching, mechanical parts, biomolecules, face recognition, and other fields.

摘要

随着大数据时代的到来,隐私计算在保护数据隐私的前提下对数据进行分析和计算,实现数据“可用不可见”。作为安全多方计算的重要分支,几何问题可以解决军事、国防、金融、生活等领域的实际问题,具有重要的研究意义。本文研究了几何图形的相似性问题。首先,本文提出了同构图形的邻接矩阵向量编码方法,并利用 Paillier 变体加密密码学在半诚实模型下解决同构图形保密性问题。利用椭圆曲线密码系统、零知识证明、切选方法等密码学工具,本文设计了一种能够抵抗恶意对手攻击的图形相似性安全决策协议。分析表明,该协议具有较高的计算效率,在地形匹配、机械零件、生物分子、人脸识别等领域具有广泛的应用价值。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/5e68fdcdc4d0/41598_2023_30741_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/45866b79d1fa/41598_2023_30741_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/3635ca6d4e7c/41598_2023_30741_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/d5a333e47952/41598_2023_30741_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/d1cb11eb5711/41598_2023_30741_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/16a304c5958f/41598_2023_30741_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/08a539540cd5/41598_2023_30741_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/20b1ae5d3b5f/41598_2023_30741_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/ad955342b683/41598_2023_30741_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/5e68fdcdc4d0/41598_2023_30741_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/45866b79d1fa/41598_2023_30741_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/3635ca6d4e7c/41598_2023_30741_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/d5a333e47952/41598_2023_30741_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/d1cb11eb5711/41598_2023_30741_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/16a304c5958f/41598_2023_30741_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/08a539540cd5/41598_2023_30741_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/20b1ae5d3b5f/41598_2023_30741_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/ad955342b683/41598_2023_30741_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8129/10030665/5e68fdcdc4d0/41598_2023_30741_Fig9_HTML.jpg

相似文献

1
The secure judgment of graphic similarity against malicious adversaries and its applications.图形相似性的安全判断及其在对抗恶意对手方面的应用。
Sci Rep. 2023 Mar 21;13(1):4617. doi: 10.1038/s41598-023-30741-6.
2
Secure computation protocol of Chebyshev distance under the malicious model.恶意模型下切比雪夫距离的安全计算协议
Sci Rep. 2024 Jul 24;14(1):17115. doi: 10.1038/s41598-024-67907-9.
3
Efficient Privacy-preserving Logistic Model With Malicious Security.具有恶意安全性的高效隐私保护逻辑模型
IEEE Trans Inf Forensics Secur. 2024;19:5751-5766. doi: 10.1109/tifs.2024.3402319. Epub 2024 May 17.
4
Secure Vehicular Platoon Management against Sybil Attacks.安全的车队管理抵御 Sybil 攻击。
Sensors (Basel). 2022 Nov 21;22(22):9000. doi: 10.3390/s22229000.
5
Two-Party Privacy-Preserving Set Intersection with FHE.基于全同态加密的两方隐私保护集合交集
Entropy (Basel). 2020 Nov 25;22(12):1339. doi: 10.3390/e22121339.
6
A Privacy-Preserving, Two-Party, Secure Computation Mechanism for Consensus-Based Peer-to-Peer Energy Trading in the Smart Grid.一种基于共识的智能电网中对等能源交易的隐私保护、两方安全计算机制。
Sensors (Basel). 2022 Nov 21;22(22):9020. doi: 10.3390/s22229020.
7
Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud.恶意云环境下矩阵行列式计算的安全外包
Sensors (Basel). 2021 Oct 14;21(20):6821. doi: 10.3390/s21206821.
8
Secure Comparisons of Single Nucleotide Polymorphisms Using Secure Multiparty Computation: Method Development.使用安全多方计算进行单核苷酸多态性的安全比较:方法开发
JMIR Bioinform Biotechnol. 2023 Jul 18;4:e44700. doi: 10.2196/44700.
9
A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.一种使用椭圆曲线密码系统的适用于医疗环境的安全射频识别认证协议。
J Med Syst. 2014 May;38(5):46. doi: 10.1007/s10916-014-0046-9. Epub 2014 Apr 23.
10
A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.一种使用椭圆曲线密码学的用于医疗环境的安全射频识别相互认证协议。
J Med Syst. 2015 Mar;39(3):24. doi: 10.1007/s10916-015-0213-7. Epub 2015 Feb 10.

本文引用的文献

1
Record linkage based patient intersection cardinality for rare disease studies using Mainzelliste and secure multi-party computation.基于 Mainzelliste 和安全多方计算的罕见病研究中基于记录链接的患者交集基数。
J Transl Med. 2022 Oct 8;20(1):458. doi: 10.1186/s12967-022-03671-6.
2
Automatic Inspection of Aeronautical Mechanical Assemblies by Matching the 3D CAD Model and Real 2D Images.通过匹配3D CAD模型与真实2D图像对航空机械组件进行自动检测。
J Imaging. 2019 Oct 19;5(10):81. doi: 10.3390/jimaging5100081.
3
Using Secure Multi-Party Computation to Protect Privacy on a Permissioned Blockchain.
使用安全多方计算在许可区块链上保护隐私。
Sensors (Basel). 2021 Feb 23;21(4):1540. doi: 10.3390/s21041540.
4
BioAFMviewer: An interactive interface for simulated AFM scanning of biomolecular structures and dynamics.BioAFMviewer:用于模拟原子力显微镜扫描生物分子结构和动力学的交互式界面。
PLoS Comput Biol. 2020 Nov 18;16(11):e1008444. doi: 10.1371/journal.pcbi.1008444. eCollection 2020 Nov.
5
Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform.基于云平台的固体三角形面积和四面体体积的安全两方计算。
PLoS One. 2019 Jun 13;14(6):e0217067. doi: 10.1371/journal.pone.0217067. eCollection 2019.